SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 651675 of 800 papers

TitleStatusHype
Change Detection in Noisy Dynamic Networks: A Spectral Embedding Approach0
Intrusion detection systems using classical machine learning techniques versus integrated unsupervised feature learning and deep neural network0
K-Metamodes: frequency- and ensemble-based distributed k-modes clustering for security analyticsCode0
LuNet: A Deep Neural Network for Network Intrusion DetectionCode0
Detecting malicious logins as graph anomalies0
Walling up Backdoors in Intrusion Detection SystemsCode0
Destination-aware Adaptive Traffic Flow Rule Aggregation in Software-Defined Networks0
A Transfer Learning Approach for Network Intrusion Detection0
TEST: an End-to-End Network Traffic Examination and Identification Framework Based on Spatio-Temporal Features Extraction0
SynGAN: Towards Generating Synthetic Network Attacks using GANs0
Sparse Bayesian approach for metric learning in latent spaceCode0
Omni SCADA Intrusion Detection Using Deep Learning Algorithms0
Road Context-aware Intrusion Detection System for Autonomous Cars0
Learning Neural Representations for Network Anomaly DetectionCode0
Data Analysis of Wireless Networks Using Classification Techniques0
New Era of Deeplearning-Based Malware Intrusion Detection: The Malware Detection and Prediction Based On Deep Learning0
Using Temporal and Topological Features for Intrusion Detection in Operational Networks0
Multivariate Big Data Analysis for Intrusion Detection: 5 steps from the haystack to the needle0
Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning0
Analyzing and Storing Network Intrusion Detection Data using Bayesian Coresets: A Preliminary Study in Offline and Streaming Settings0
Deep Reinforcement Learning for Cyber Security0
A Combination of Temporal Sequence Learning and Data Description for Anomaly-based NIDS0
CANet: An Unsupervised Intrusion Detection System for High Dimensional CAN Bus Data0
Generative Adversarial Networks for Distributed Intrusion Detection in the Internet of Things0
The Adversarial Machine Learning Conundrum: Can The Insecurity of ML Become The Achilles' Heel of Cognitive Networks?0
Show:102550
← PrevPage 27 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified